This page was exported from Updated Study Materials From Lead2pass Free Downloading [ ] Export date:Fri Dec 13 3:45:25 2019 / +0000 GMT ___________________________________________________ Title: [2017 New] Updated 200-105 New Questions From Lead2pass Free Downloading (201-225) --------------------------------------------------- 2017 June Cisco Official New Released 200-105 Dumps in! 100% Free Download! 100% Pass Guaranteed! Lead2pass has updated the latest version of Cisco 200-105 exam, which is a hot exam of Cisco certification. It is Lead2pass Cisco 200-105 exam dumps that give you confidence to pass this certification exam in first attempt and with maximized score. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 201Which command shows your active Telnet connections? A.    show cdp neigborsB.    show sessionC.    show usersD.    show vty logins Answer: B QUESTION 202Which component of VPN technology ensures that data is unaltered between the sender and recipient? A.    encryptionB.    authenticationC.    key exchangeD.    data integrity Answer: D QUESTION 203What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72? A.    B514 : 82C3 : 0029 : EC7A : EC72B.    B514 : 82C3 :: 0029 : EC7A : EC72C.    B514 : 82C3 : 0029 :: EC7A : 0000 : EC72D.    B514 : 82C3 :: 0029 : EC7A : 0 : EC72 Answer: D QUESTION 204In which integration method is an IPv6 packet encapsulated within an IPv4 protocol? A.    dual-stackB.    proxyC.    dot1qD.    tunneling Answer: D QUESTION 205Refer to the exhibit. How should Switch1 and Switch2 be connected in order to allow full communication between all of the hosts? A.    Exhibit AB.    Exhibit BC.    Exhibit CD.    Exhibit DE.    Exhibit EF.    Exhibit F Answer: F QUESTION 206Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations. What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use? A.    Configure static entries in the switch MAC address table to include the range of addresses used byvisiting employees.B.    Configure an ACL to allow only a single MAC address to connect to the switch at one time.C.    Use the mac-address-table 1 global configuration command to limit each port to one source MAC address.D.    Implement Port Security on all interfaces and use the port-security maximum 1 command to limit portaccess to a single MAC address.E.    Implement Port Security on all interfaces and use the port-security mac-address sticky command tolimit access to a single MAC address.F.    Implement Port Security at global configuration mode and use the port-security maximum 1 commandto allow each switch only one attached hub. Answer: D QUESTION 207Refer to the exhibit. Which two statements about the configuration of the switch interface are correct? (Choose two.) A.    The switchport belongs only to VLAN 2.B.    By default, all switch ports are members of VLAN 1005.C.    Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2.D.    The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2.E.    A network host can be connected to this interface. Answer: AE QUESTION 208Which three elements must be used when you configure a router interface for VLAN trunking? (Choose three.) A.    one physical interface for each subinterfaceB.    one IP network or subnetwork for each subinterfaceC.    a management domain for each subinterfaceD.    subinterface encapsulation identifiers that match VLAN tagsE.    one subinterface per VLANF.    subinterface numbering that matches VLAN tags Answer: BDE QUESTION 209Which three statements about VTP features are true? (Choose three.) A.    VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured.B.    When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies.C.    When properly configured, VTP maintains VLAN configuration consistency and accelerates trunk linknegotiation.D.    Each broadcast domain on a switch can have its own unique VTP domain.E.    VTP pruning is used to increase available bandwidth in trunk links.F.    To configure a switch to be part of two VTP domains, each domain must have its own passwords.G.    Client, server, and transparent are valid VTP modes. Answer: BEG QUESTION 210Two switches are connected through a trunk link. Which two commands show that there is a native VLAN mismatch on that link? (Choose two.) A.    show vlan briefB.    show interface trunkC.    show interface vlanD.    show interface switchportE.    show interface interfaceF.    show switchport trunk Answer: BD QUESTION 211Which statement about IPv6 is true? A.    Addresses are not hierarchical and are assigned at random.B.    Only one IPv6 address can exist on a given interface.C.    There are 2.7 billion addresses available.D.    Broadcasts have been eliminated and replaced with multicasts. Answer: D QUESTION 212Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A? A.    The IP address for Server A is a broadcast address.B.    The IP address for Workstation B is a subnet address.C.    The gateway for Workstation B is not on the same subnet.D.    The gateway for Server A is not on the same subnet. Answer: D QUESTION 213You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement? A. Answer: B QUESTION 214How does using the service password-encryption command on a router provide additional security? A.    by encrypting all passwords passing through the routerB.    by encrypting passwords in the plain text configuration fileC.    by requiring entry of encrypted passwords for access to the deviceD.    by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE.    by automatically suggesting encrypted passwords for use in configuring the router Answer: B QUESTION 215In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? A.    during high traffic periodsB.    after broken links are re-establishedC.    when upper-layer protocols require high reliabilityD.    in an improperly implemented redundant topologyE.    when a dual ring topology is in use Answer: D QUESTION 216A network administrator is configuring the routers in the graphic for OSPF. The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the /24 LAN segment. What configuration tasks could be used to establish this preference? (Choose three.) A.    Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.B.    Change the router id of Router B by assigning the IP address to the Fa0/0 interface of RouterB.C.    Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.D.    Change the priority value of the Fa0/0 interface of RouterB to zero.E.    Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.F.    No further configuration is necessary. Answer: ACE QUESTION 217When are packets processed by an inbound access list? A.    before they are routed to an outbound interfaceB.    after they are routed to an outbound interfaceC.    before and after they are routed to an outbound interfaceD.    after they are routed to an outbound interface but before being placed in the outbound queue Answer: A QUESTION 218Which command can be used from a router to verify the Layer 3 path to a host? A.    tracert addressB.    traceroute addressC.    telnet addressD.    ssh address Answer: B QUESTION 219An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching the HR server attached to the Eastfield router but allow Telnet traffic to other destinations. Given the following access list: access-list 101 deny tcp any any eq 23permit ip any any On which router, interface, and in what direction should the access list be placed to most efficiently implement this list? (Choose three.) A.    WestfieldB.    EastfieldC.    e0D.    s0E.    inF.    out Answer: BCF QUESTION 220Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? A.    static NATB.    dynamic NATC.    overloadingD.    overlappingE.    port loading Answer: C QUESTION 221Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but only from the network administrator's computer. Which group of commands would be the best choice to allow only the IP address to have Telnet access to the router? A.    access-list 101 permit tcp any host eq telnetinterface s0/0ip access-group 101 inB.    access-list 3 permit host vty 0 4access-class 3 inC.    access-list 101 permit tcp any host eq telnetaccess-list 101 permit ip any anyinterface s0/0ip access-group 101 inD.    access-list 3 permit host vty 0 4ip access-group 3 in Answer: B QUESTION 222Refer to the exhibit. What command sequence will enable PAT from the inside to outside network? A.    (config) ip nat pool isp-net netmask overloadB.    (config-if) ip nat outside overloadC.    (config) ip nat inside source list 1 interface ethernet1 overloadD.    (config-if) ip nat inside overload Answer: C QUESTION 223Which two statements about static NAT translations are true? (Choose two.) A.    They allow connections to be initiated from the outside.B.    They require no inside or outside interface markings because addresses are statically defined.C.    They are always present in the NAT table.D.    They can be configured with access lists, to allow two or more connections to be initiated from theoutside. Answer: AC QUESTION 224A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.) A.    Configure port Fa0/1 to accept connections only from the static IP address of the server.B.    Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C.    Configure the MAC address of the server as a static entry associated with port Fa0/1.D.    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofingthe server IP address.E.    Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F.    Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1. Answer: CE QUESTION 225The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork? A. Answer: E Lead2pass offers you all the 200-105 exam questions which are the same as your real test with 100% correct and coverage rate. We provide the latest full version of 200-105 PDF and VCE dumps to ensure your 200-105 exam 100% pass. 200-105 new questions on Google Drive: 2017 Cisco 200-105 exam dumps (All 402 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-06-22 01:22:24 Post date GMT: 2017-06-22 01:22:24 Post modified date: 2017-06-22 01:22:24 Post modified date GMT: 2017-06-22 01:22:24 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from